Persistent Access Tokens will be deployed in early November 2022.
A Persistent Access Token (PAT) interacts with the CloudCard API as a refresh token. PATs function as a token with which you can obtain a short-lived Authentication Token (or session token). PATs are customizable; they can be deleted at any time and can have a max number of uses and/or an expiration date.
CloudCard directors can create a Persistent Access Token for a service account via the CloudCard user interface (see this video). In order to create a Persistent Access Token, click the service account that you want to create the token for, and scroll to the bottom of the page to find the Persistent Access Tokens settings:
Once the PAT has been created, be sure to copy the token value before closing the pop-up, since it cannot be displayed again:
Using Persistent Access Tokens
You cannot use a PAT to access any API resources except to create Authentication Tokens.
To use a Persistent Access Token to request an Authentication Token (aka session token), include it in the request body to Get an Authentication Token (Session Token). The Authentication Token that is returned can be used for up to 12 hours to make requests to the API.
If you no longer need an Authentication Token that has not yet expired, it should be disposed of by making a logout request to Log Out Authentication Token(s).